Image from Google Jackets

Introduction to computer security / Matt Bishop

By: Material type: TextTextLanguage: İngilizce Publisher: Boston : Addison-Wesley, [2005]Copyright date: ©2005Description: xxxii, 747 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 0321247442 (hardcover : alk. paper)
  • 9780321247445 hardcover : alk. paper)
Subject(s): LOC classification:
  • QA76.9.A25 B563 2005
Contents:
Preface -- An Overview of Computer Security -- Access Control Matrix -- Foundational Results -- Security Policies -- Confidentiality Politices -- Integrity Policies -- Hybrid Policies -- Basic Cryptography -- Key Management -- Clipher Techniques -- Authentication -- Design Principles -- Representing Identity -- Access Control Mechanisms -- Information Flow -- Confinement Problem -- Introduction to Assurance -- Evaluating Systems -- Mallicious Logic -- Vulnerability Analysis -- Auditing -- Intrusion Detection -- Network Security -- System sEcurity -- User Security -- Program Security -- Lattices -- The Extended Euclidean Algorithm -- Virtual Machines.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Status Notes Date due Barcode
Book Book Merkez Kütüphane Genel Koleksiyon / Main Collection Merkez Kütüphane Genel Koleksiyon QA76.9.A25 B563 2005 (Browse shelf(Opens below)) Available Donated by Kemal Bıçakcı 0060334

Preface -- An Overview of Computer Security -- Access Control Matrix -- Foundational Results -- Security Policies -- Confidentiality Politices -- Integrity Policies -- Hybrid Policies -- Basic Cryptography -- Key Management -- Clipher Techniques -- Authentication -- Design Principles -- Representing Identity -- Access Control Mechanisms -- Information Flow -- Confinement Problem -- Introduction to Assurance -- Evaluating Systems -- Mallicious Logic -- Vulnerability Analysis -- Auditing -- Intrusion Detection -- Network Security -- System sEcurity -- User Security -- Program Security -- Lattices -- The Extended Euclidean Algorithm -- Virtual Machines.

Donated by Kemal Bıçakcı

There are no comments on this title.

to post a comment.
Devinim Yazılım Eğitim Danışmanlık tarafından Koha'nın orjinal sürümü uyarlanarak geliştirilip kurulmuştur.